international journal of security and networkscs.ua.edu/~yangxiao/ijsn_leaflet.pdf ·  ·...

6
International Journal of Security and Networks

Upload: vubao

Post on 29-Apr-2018

223 views

Category:

Documents


5 download

TRANSCRIPT

International Journal of

Security andNetworks

v i s i t w w w . i n d e r s c i e n c e . c o m

Scope of the JournalIJSN proposes and fosters discussion on and dissemination of network securityrelated issues.

Subject coverage:Topics suitable for IJSN include but are notlimited to:

Security in Wireless Networks and MobileComputing• Security in cellular networks (2G, 2.5G, 3G,

B3G, 4G, etc.)• Security in wireless LANs (IEEE 802.11

WLAN, WiFi, and HiperLAN/2)• Security in wireless PANs (Bluetooth and IEEE

802.15)• Security in wireless MANs (IEEE 802.16 and

WiMAX)• Security in sensor networks• Security in ad hoc networks• Security in mobile IP• Security in wireless internet• Security in satellite networks• Security in integrated wireless networks• Security in wired and wireless integrated

networks• Security in wireless communications

Security in Wired Networks• Security in IP networks• Security in internet and WWW• Security in high-speed networks• Security in peer-to-peer networks• Security in optical systems and networks• Security in VoIP• Security in e-mail• Security in domain name service• Security in integrated networks• Security in communications• Security in content-delivery networks• Security in distributed systems

Security Issues in Networks include:• Attacks, security mechanisms, and security

services• Authentication• Authorisation• Access control• Multicast security• Distributed access control• Data confidentiality• Data integrity• Non-repudiation• Firewall• Privacy protection

• Security specification techniques• Encryption and decryption• Secure routing protocols• Formal analyses• Security group communications• Intrusion detection• Key management• Trust establishment• Revocation of malicious parties• Security policies• Fraudulent usage• Dependability and reliability• Anonymity• Prevention of traffic analysis• Secure PHY/MAC/routing protocols• Secure location determination• Denial of service• Network security performance evaluation• Tradeoff analysis between performance and

security• Network forensics• Design or analysis of security protocols• Security standards

www.inderscience.com/ijsn

International Journal of

Security andNetworks

v i s i t w w w . i n d e r s c i e n c e . c o m

Members of the Editorial BoardEditor-in-ChiefProf. Yang XiaoUniversity of Alabama, USA

Editorial Board Prof. Dr. Elisa BertinoPurdue University, USA

Prof. Dr. Michael BurmesterFlorida State University, USA

Prof. Hsiao-Hwa ChenNational Sun Yat-Sen University, Taiwan

Dr. Ding-zhu DuUniversity of Texas at Dallas, USA

Dr. Elmootazbellah ElnozahyIBM Austin Research Lab, USA

Dr. Joseph B. EvansThe University of Kansas, USA

Dr. Matthew FranklinUniversity of California at Davis, USA

Dr. Thomas JohanssonLund University, Sweden

Prof. Mohan S. KankanhalliNational University of Singapore, Singapore

Dr. George KesidisThe Pennsylvania State University, USA

Dr. Sy-Yen KuoNational Taiwan University, Taiwan

Dr. Kai LiPrinceton University, USA

Prof. Jason Yi-Bing LinNational Chiao Tung University, Taiwan

Dr. Prabhaker MatetiWright State University, USA

Dr. Roy A. MaxionCarnegie Mellon University, USA

Dr. Nasir MemonPolytechnic University, USA

Dr. Jelena MisicUniversity of Manitoba, Canada

Dr. Yi MuUniversity of Wollongong, Australia

Dr. Kaisa NybergHelsinki University of Technology, Finland

Prof. Yi PanGeorgia State University, USA

Prof. Dr. Josef PieprzykMacquarie University, Australia

Dr. André SchiperÉcole Polytechnique Fédérale de Lausanne (EPFL),Switzerland

Dr. Xuemin ShenUniversity of Waterloo, Canada

Dr. Krishna M SivalingamUniversity of Maryland Baltimore County, USA

Dr. Neeraj SuriTechnische University DarmstadtDarmstadt, Germany

Prof. Dr. Doug TygarUniversity of California at Berkeley, USA

Prof. Laurence T. YangSt. Francis Xavier University, Canada

Dr. Moti YungColumbia University, USA

Prof. Wei ZhaoTexas A&M University, USA

Methods of payment

To be completed by all subscribers

Terms are payment with order. Payment bycheque, banker’s draft or credit card isacceptable.

Name of subscriber

............................................................................

...........................................................................

Position ..............................................................

Institution ............................................................

Address ..............................................................

...........................................................................

...........................................................................

...........................................................................

...........................................................................

...........................................................................

...........................................................................

...........................................................................

Fax ......................................................................

E-mail .................................................................

Credit card type and number

............................................................................

............................................................................

Three-digit security number (on the reverse of the credit card) ......................

Signature.............................................................

Date ....................................................................

Please address subscription orders to theaddress overleaf

Content of InauguralIssue of IJSNVOL. 1(1/2), 2006

Workflow authorisation in mediator-freeenvironmentsMohamed Shehab, Elisa Bertino, Arif Ghafoor

Vulnerability analysis of certificate graphsEunjin (EJ) Jung, Mohamed G. Gouda

Secure scalable group signature withdynamic joins and separable authoritiesAggelos Kiayias, Moti Yung

A survey of key evolving cryptosystemsMatt Franklin

A taxonomy of internet tracebackIhab Hamadeh, George Kesidis

An approach to synthesise safe systemsArshad Jhumka, Felix Freiling, Christof Fetzer,Neeraj Suri

Wireless networking security: open issuesin trust, management, interoperation andmeasurementJoseph B. Evans, Weichao Wang, Benjamin J. Ewy

Three ways to mount distinguishingattacks on irregularly clocked streamciphersHakan Englund, Thomas Johansson

Building trust in peer-to-peer systems: areviewBo Zhu, Sushil Jajodia, Mohan S. Kankanhalli

Secure collaborations over messageboardsMahalingam Ramkumar, Nasir Memon

Relevant Inderscience TitlesInternational Journal of Advanced Media andCommunication

International Journal of Applied Cryptography

International Journal of Communication Networksand Distributed Systems

International Journal of Electronic Security andDigital Forensics

International Journal of Information and CodingTheory

International Journal of Information andCommunication Technology

International Journal of Information andComputer Security

International Journal of Learning Technology

International Journal of Mobile Communications

International Journal of Mobile Learning andOrganisation

International Journal of Mobile Network Designand Innovation

International Journal of Networking and VirtualOrganisations

International Journal of Radio FrequencyIdentification Technology and Applications

International Journal of Sensor Networks

International Journal of Wireless and MobileComputing

These titles are part of a unique profile on:COMMUNICATIONS AND MOBILETECHNOLOGY

For information about these titles over 200highly professional journals developed byInderscience, please visit the website at:www.inderscience.com

Subscription order form

This form may be photocopied ordownloaded fromwww.inderscience.com/www/ielsubsform2.pdf

Journals may be ordered online fromhttp://inderscience.metapress.com

The subscription rate for four issues ofInternational Journal of Security andNetworks (IJSN) is:

Print or Online €450 / Print and Online €610(add €40 for Print if airmail required).

All prices in Euros or Euro-equivalent inUS Dollars or GBP £ Sterling.

Please address subscription orders to:

lnderscience Enterprises Ltd. (Order Dept.)World Trade Center Building29 Route de Pre-Bois, Case Postale 896,CH-1215 Genève 15, SWITZERLAND

For rush orders please: fax: +44 1234 240515 or E-mail: [email protected]

Please enter the following regular subscriptions to IJSN

........ subscriptions (Print or Online)

at €450 each (plus €40 if airmail required)

[delete as necessary]

........ subscriptions (Print and Online)

at €610 each (plus €40 if airmail required)

[delete as necessary]

Total ..................................................................

Methods of payment overleaf

v i s i t w w w . i n d e r s c i e n c e . c o m

Notes for Authors and Submission of Papers

Submitted papers should not have been previously published or be currently underconsideration for publication elsewhere.

All papers are refereed through a double-blind process. A guide for authors and otherrelevant information for submitting papers are available on the Submission of Paperssection of the Inderscience website: please go to

Author Guidelines(http://www.inderscience.com/papers)

To submit a paper, please go to

Submission of Papers(http://www.inderscience.com/papers/about.php)

ALL PAPERS MUST BE SUBMITTED ONLINE. If you experience any problemssubmitting your paper online, please contact [email protected], describingthe exact problem you experience.

(Please include in your email the title of the Journal)